Topic 1: Hijacking TechniquesA variety of session hijacking techniques have been developed with new techniques continuing to be developed. Using the Kaplan library and the Internet research session hijacking techniques. Select a session hijacking technique or threat and summarize the technique as well as the threat it presents to the person or organization being attacked. Be sure to include references to the source of your research and try to select a session hijacking technique that has not already been discussed. Respond to two of your peer’s postings by assessing their analysis of the threat as well as offering recommendations on how an organization or individual can protect itself from such attack.